mirror of
				https://github.com/dani-garcia/vaultwarden.git
				synced 2025-10-31 02:08:20 +02:00 
			
		
		
		
	Merge branch 'more-clippy-checks' of https://github.com/BlackDex/vaultwarden into BlackDex-more-clippy-checks
This commit is contained in:
		| @@ -913,8 +913,8 @@ async fn save_attachment( | ||||
|     // In the v2 API, the attachment record has already been created, | ||||
|     // so the size limit needs to be adjusted to account for that. | ||||
|     let size_adjust = match &attachment { | ||||
|         None => 0,                     // Legacy API | ||||
|         Some(a) => a.file_size as i64, // v2 API | ||||
|         None => 0,                         // Legacy API | ||||
|         Some(a) => i64::from(a.file_size), // v2 API | ||||
|     }; | ||||
|  | ||||
|     let size_limit = if let Some(ref user_uuid) = cipher.user_uuid { | ||||
| @@ -1496,7 +1496,7 @@ pub enum CipherSyncType { | ||||
| impl CipherSyncData { | ||||
|     pub async fn new(user_uuid: &str, ciphers: &Vec<Cipher>, sync_type: CipherSyncType, conn: &DbConn) -> Self { | ||||
|         // Generate a list of Cipher UUID's to be used during a query filter with an eq_any. | ||||
|         let cipher_uuids = stream::iter(ciphers).map(|c| c.uuid.to_string()).collect::<Vec<String>>().await; | ||||
|         let cipher_uuids = stream::iter(ciphers).map(|c| c.uuid.clone()).collect::<Vec<String>>().await; | ||||
|  | ||||
|         let mut cipher_folders: HashMap<String, String> = HashMap::new(); | ||||
|         let mut cipher_favorites: HashSet<String> = HashSet::new(); | ||||
| @@ -1518,7 +1518,7 @@ impl CipherSyncData { | ||||
|         // Generate a list of Cipher UUID's containing a Vec with one or more Attachment records | ||||
|         let mut cipher_attachments: HashMap<String, Vec<Attachment>> = HashMap::new(); | ||||
|         for attachment in Attachment::find_all_by_ciphers(&cipher_uuids, conn).await { | ||||
|             cipher_attachments.entry(attachment.cipher_uuid.to_string()).or_default().push(attachment); | ||||
|             cipher_attachments.entry(attachment.cipher_uuid.clone()).or_default().push(attachment); | ||||
|         } | ||||
|  | ||||
|         // Generate a HashMap with the Cipher UUID as key and one or more Collection UUID's | ||||
| @@ -1530,14 +1530,14 @@ impl CipherSyncData { | ||||
|         // Generate a HashMap with the Organization UUID as key and the UserOrganization record | ||||
|         let user_organizations: HashMap<String, UserOrganization> = | ||||
|             stream::iter(UserOrganization::find_by_user(user_uuid, conn).await) | ||||
|                 .map(|uo| (uo.org_uuid.to_string(), uo)) | ||||
|                 .map(|uo| (uo.org_uuid.clone(), uo)) | ||||
|                 .collect() | ||||
|                 .await; | ||||
|  | ||||
|         // Generate a HashMap with the User_Collections UUID as key and the CollectionUser record | ||||
|         let user_collections: HashMap<String, CollectionUser> = | ||||
|             stream::iter(CollectionUser::find_by_user(user_uuid, conn).await) | ||||
|                 .map(|uc| (uc.collection_uuid.to_string(), uc)) | ||||
|                 .map(|uc| (uc.collection_uuid.clone(), uc)) | ||||
|                 .collect() | ||||
|                 .await; | ||||
|  | ||||
|   | ||||
| @@ -761,7 +761,7 @@ pub async fn emergency_request_timeout_job(pool: DbPool) { | ||||
|         for mut emer in emergency_access_list { | ||||
|             if emer.recovery_initiated_at.is_some() | ||||
|                 && Utc::now().naive_utc() | ||||
|                     >= emer.recovery_initiated_at.unwrap() + Duration::days(emer.wait_time_days as i64) | ||||
|                     >= emer.recovery_initiated_at.unwrap() + Duration::days(i64::from(emer.wait_time_days)) | ||||
|             { | ||||
|                 emer.status = EmergencyAccessStatus::RecoveryApproved as i32; | ||||
|                 emer.save(&conn).await.expect("Cannot save emergency access on job"); | ||||
| @@ -812,7 +812,7 @@ pub async fn emergency_notification_reminder_job(pool: DbPool) { | ||||
|         for mut emer in emergency_access_list { | ||||
|             if (emer.recovery_initiated_at.is_some() | ||||
|                 && Utc::now().naive_utc() | ||||
|                     >= emer.recovery_initiated_at.unwrap() + Duration::days((emer.wait_time_days as i64) - 1)) | ||||
|                     >= emer.recovery_initiated_at.unwrap() + Duration::days((i64::from(emer.wait_time_days)) - 1)) | ||||
|                 && (emer.last_notification_at.is_none() | ||||
|                     || (emer.last_notification_at.is_some() | ||||
|                         && Utc::now().naive_utc() >= emer.last_notification_at.unwrap() + Duration::days(1))) | ||||
|   | ||||
| @@ -95,7 +95,7 @@ async fn enforce_disable_hide_email_policy(data: &SendData, headers: &Headers, c | ||||
|     Ok(()) | ||||
| } | ||||
|  | ||||
| async fn create_send(data: SendData, user_uuid: String) -> ApiResult<Send> { | ||||
| fn create_send(data: SendData, user_uuid: String) -> ApiResult<Send> { | ||||
|     let data_val = if data.Type == SendType::Text as i32 { | ||||
|         data.Text | ||||
|     } else if data.Type == SendType::File as i32 { | ||||
| @@ -117,7 +117,7 @@ async fn create_send(data: SendData, user_uuid: String) -> ApiResult<Send> { | ||||
|         ); | ||||
|     } | ||||
|  | ||||
|     let mut send = Send::new(data.Type, data.Name, data_str, data.Key, data.DeletionDate.naive_utc()).await; | ||||
|     let mut send = Send::new(data.Type, data.Name, data_str, data.Key, data.DeletionDate.naive_utc()); | ||||
|     send.user_uuid = Some(user_uuid); | ||||
|     send.notes = data.Notes; | ||||
|     send.max_access_count = match data.MaxAccessCount { | ||||
| @@ -171,7 +171,7 @@ async fn post_send(data: JsonUpcase<SendData>, headers: Headers, conn: DbConn, n | ||||
|         err!("File sends should use /api/sends/file") | ||||
|     } | ||||
|  | ||||
|     let mut send = create_send(data, headers.user.uuid).await?; | ||||
|     let mut send = create_send(data, headers.user.uuid)?; | ||||
|     send.save(&conn).await?; | ||||
|     nt.send_send_update(UpdateType::SyncSendCreate, &send, &send.update_users_revision(&conn).await).await; | ||||
|  | ||||
| @@ -211,7 +211,7 @@ async fn post_send_file(data: Form<UploadData<'_>>, headers: Headers, conn: DbCo | ||||
|         None => SIZE_525_MB, | ||||
|     }; | ||||
|  | ||||
|     let mut send = create_send(model, headers.user.uuid).await?; | ||||
|     let mut send = create_send(model, headers.user.uuid)?; | ||||
|     if send.atype != SendType::File as i32 { | ||||
|         err!("Send content is not a file"); | ||||
|     } | ||||
|   | ||||
| @@ -139,7 +139,7 @@ pub async fn validate_totp_code( | ||||
|     // The amount of steps back and forward in time | ||||
|     // Also check if we need to disable time drifted TOTP codes. | ||||
|     // If that is the case, we set the steps to 0 so only the current TOTP is valid. | ||||
|     let steps = !CONFIG.authenticator_disable_time_drift() as i64; | ||||
|     let steps = i64::from(!CONFIG.authenticator_disable_time_drift()); | ||||
|  | ||||
|     // Get the current system time in UNIX Epoch (UTC) | ||||
|     let current_time = chrono::Utc::now(); | ||||
| @@ -154,7 +154,7 @@ pub async fn validate_totp_code( | ||||
|         let generated = totp_custom::<Sha1>(30, 6, &decoded_secret, time); | ||||
|  | ||||
|         // Check the the given code equals the generated and if the time_step is larger then the one last used. | ||||
|         if generated == totp_code && time_step > twofactor.last_used as i64 { | ||||
|         if generated == totp_code && time_step > i64::from(twofactor.last_used) { | ||||
|             // If the step does not equals 0 the time is drifted either server or client side. | ||||
|             if step != 0 { | ||||
|                 warn!("TOTP Time drift detected. The step offset is {}", step); | ||||
| @@ -165,7 +165,7 @@ pub async fn validate_totp_code( | ||||
|             twofactor.last_used = time_step as i32; | ||||
|             twofactor.save(conn).await?; | ||||
|             return Ok(()); | ||||
|         } else if generated == totp_code && time_step <= twofactor.last_used as i64 { | ||||
|         } else if generated == totp_code && time_step <= i64::from(twofactor.last_used) { | ||||
|             warn!("This TOTP or a TOTP code within {} steps back or forward has already been used!", steps); | ||||
|             err!(format!("Invalid TOTP code! Server time: {} IP: {}", current_time.format("%F %T UTC"), ip.ip)); | ||||
|         } | ||||
|   | ||||
| @@ -147,7 +147,7 @@ async fn activate_yubikey(data: JsonUpcase<EnableYubikeyData>, headers: Headers, | ||||
|         verify_yubikey_otp(yubikey.to_owned()).map_res("Invalid Yubikey OTP provided")?; | ||||
|     } | ||||
|  | ||||
|     let yubikey_ids: Vec<String> = yubikeys.into_iter().map(|x| (&x[..12]).to_owned()).collect(); | ||||
|     let yubikey_ids: Vec<String> = yubikeys.into_iter().map(|x| (x[..12]).to_owned()).collect(); | ||||
|  | ||||
|     let yubikey_metadata = YubikeyMetadata { | ||||
|         Keys: yubikey_ids, | ||||
|   | ||||
		Reference in New Issue
	
	Block a user